Search

Your search keyword '"Storage security"' showing total 351 results

Search Constraints

Start Over You searched for: Descriptor "Storage security" Remove constraint Descriptor: "Storage security"
351 results on '"Storage security"'

Search Results

1. Research on Distributed Network Data Storage Security based on block chain

2. Design of cloud data storage security and financial risk control management early warning system based on sensor networks

3. Publish/Subscribe Method for Real-Time Data Processing in Massive IoT Leveraging Blockchain for Secured Storage.

4. Cloud Computing Security.

5. Literature Survey on Empirical Analysis on Efficient Secured Data Communication in Cloudcomputing Environment

6. Embedded Devices Security: Design and Implementation of a Light RDBMS Encryption Utilizing Multi-Core Processors

7. Data Migration and Storage Security of University Library

8. Tele-Health Security Framework for Medical Image Storage.

9. A Strong Combination of Cryptographic Techniques to Secure Cloud-Hosted Data.

10. A Hybrid Multi-Cloud Framework Using the IBBE Key Management System for Securing Data Storage.

11. Framework Towards Higher Data Privacy by Novel Data Integrity Scheme

12. Effects of different mineral reaction kinetics equations on predicting long‐term CO2 mineral sequestration.

13. A Content-Based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense.

14. A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption

15. Quantitative analysis of the numerical simulation uncertainties from geological models in CO2 geological storage: A case study of Shenhua CCS project.

16. Authenticated LSM Trees with Minimal Trust

17. Application of intelligent optimization technology in CO2 geological storage and utilization.

19. Efficient ORAM Based on Binary Tree without Data Overflow and Evictions

21. Privacy-Preserving Multidimensional Range Query on Real-Time Data

23. TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing

24. Impact of formation slope and fault on CO2 storage efficiency and containment at the Shenhua CO2 geological storage site in the Ordos Basin, China.

25. Towards data storage in cryptographic systems: an efficient hardware architecture based on multivariate scheme for secure storage applications.

26. An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing

27. Research on mapping algorithm of distributed virtual storage space based on digital certificate authentication

28. A Hybrid Multi-Cloud Framework Using the IBBE Key Management System for Securing Data Storage

29. An Integrity Verification Scheme for Multiple Replicas in Clouds

31. Disk encryption: do we need to preserve length?

32. CO2 sequestration with limited sealing capability: A new injection and storage strategy in the Pearl River Mouth Basin (China).

33. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing

34. Integrity Protection for Revision Control

35. Composite confining systems: Rethinking geologic seals for permanent CO2 sequestration.

36. The Security Threats and Corresponding Measures to Distributed Storage Systems

37. An Implementation and Evaluation of Online Disk Encryption for Windows Systems

38. Multi-Instance Deep Learning Based on Attention Mechanism for Failure Prediction of Unlabeled Hard Disk Drives

39. A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption

40. Investigation of Caprock Integrity Due to Pressure Build-up During High-volume Injection into the Utsira Formation.

41. Efficient Android-based storage encryption using multi-core CPUs.

42. Impacts of stratum dip angle on CO2 geological storage amount and security.

43. Fusion: coalesced confidential storage and communication framework for the IoT.

45. RETRACTED ARTICLE: Threshold based DDoS mitigation with fog layer in cloud environment

46. RANCANG BANGUN SISTEM PENGUNCI LOKER OTOMATIS DENGAN KENDALI AKSES MENGGUNAKAN RFID DAN SIM 800L

47. Auto encryption algorithm for uploading data on cloud storage

48. Cryptography: A Quantitative Analysis of the Effectiveness of Various Password Storage Techniques

49. A Study of Key Management for Encrypted Storage in Storage Area Network

50. The impact of heterogeneous mixed siliciclastic–carbonate systems on CO 2 geological storage

Catalog

Books, media, physical & digital resources